How Important API Protection is Today

The protection of application programming interfaces (API) has become increasingly important to organizations, largely due to the proliferation of Internet of Things (IoT). Providing everyday objects with internet connectivity offers many benefits, provided their cloud platform supports these capabilities.

Blisters, A new Malware Hiding in Plain Sight

Researchers have recently discovered a stealthy malware campaign that targets computers using the Windows operating systems. It consists of a loader known as Blister and various malware that it installs onto the target computers. Blister uses a variety of techniques to remain hidden like disguising malware as legitimate executables and using valid code-signing certificates.

Dridex is sending out Termination Letters, Fake Covid Funerals

The latest Dridex phishing campaign has been using various hot topics to lure its victims, including COVID-19 funeral assistance and employee termination letters. Regardless of the message’s contents, the purpose of the email is to get the reader to click on an attachment, which is typically in Excel or Word format. Opening this document installs malicious code on the victim’s …

GoDaddy Data Breach Exposes Million Users

GoDaddy reports that it was the victim of a data breach affecting up to 1.2 million of its customers. The breach occurred in September 2021, although the web hosting service didn’t notice it until November of this year. Security researchers say the breach was the result of inadequate security that failed to meet industry best practices. While GoDaddy has changed …

Memento Ransomware Uses WinRAR to Lock your Files

Ransomware prevents its victims from accessing its own files until they comply with the attackers’ demands, which is usually a monetary payment. The traditional method of accomplishing this task is to encrypt files with the promise of providing the victim with the decryption key once the ransom is paid. A new ransomware group called Memento Team is using a new …

What You Need to Know about Cybersecurity Compliance

Due to the increasing number of cybersecurity-related laws, regulations, and standards, many companies might discover that they now need to comply with one or more of them. Here is what you need to know if your business makes that discovery.